SB2020030903 - Remote code execution in PyYAML parser and emitter for Python 



SB2020030903 - Remote code execution in PyYAML parser and emitter for Python

Published: March 9, 2020 Updated: July 15, 2020

Security Bulletin ID SB2020030903
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2020-1747)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insufficient validation of user-supplied input when processing untrusted YAML files passed via the "full_load" method or with the "FullLoader" loader. A remote attacker can pass specially crafted input to the application and execute arbitrary code by abusing the python/object/new constructor.


Remediation

Install update from vendor's website.